Introduction to ASM x86 & reverse engineering
A practical workshop teaches students how to systematically analyze malware and software without relying on access to the source code.
40 hours
Red Team
40 hours
Red Team


Reverse engineering is the process used by both security researchers and hackers to understand how programs work and how they are coded without access to the source code or software characterization documents. This course trains students to analyze software and binary script for Windows. It also gives them the skills to understand their function, their interactions with the operating system, their processing resources, storage, communication, and more. The course uses a well-organized approach with real-world examples to help students characterize and explain programs. This skill was exclusive to software developers until recently, but times are changing.  
Understanding reverse engineering allows businesses to analyze software internally rather than outsourcing the work to security research teams. It is essential for security researchers, forensic investigators, incident response teams, and intrusion investigators. During the course, students learn to take any executable software, whether flagged by a security product or not; and evaluate the level and quality of its security as if they had access to the source code.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Introduction to ASM x86
  • x86 Architecture: Registers, memory, and machine code
  • The assembler
  • Program memory segments
  • Instruction to set architecture: Mnemonics, operands, and Opcodes
  • Instruction to set architecture: Mnemonics, operands, and Opcodes
The PE format and WinAPI
  • The Portable Executable (PE) format
  • Introduction to WinAPI
  • Windows internals: Handles, COM, and networking
  • Analyzing PE files
Working with Debuggers
  • Introduction to debuggers
  • Using WinDbg with Windows
  • Using Gdb with Linux
  • Immunity Debugger
Practical Assembly
  • Functions and the stack
  • Stack calling conventions
  • Conditionals and control structures
  • Tracking branching logic
Introduction to IDA
  • Loading your first binary
  • Leveraging strings and APIs
  • Strategies for tracing program behavior
  • Reversing Unkown Binary with IDA
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • Analysts
    • Security researchers
    • Forensics researchers
    • IT specialists
    • Incident Response Teams
    • Knowledge of operation systems
    • Basic knowledge of Windows Internals
    • Familiarity with cyberwarfare methods is advantageous
    • Experience programing with C or Assembly is advantageous
    • Perform reverse engineering to investigate malware
    • Basic ASM knowledge
    • Using WinAPI
    • Working with debuggers
    • Using IDA